Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Military computers

Known as: Military computer 
This article specifically addresses US armed forces military computers and their use.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The term “hacking” has come to signify breaking into a computer system. A number of local, national, and international laws seek… Expand
2014
2014
2. FDA Regulation of Mobile Medical Applications Following the proliferation of medical devices with software components and the… Expand
Review
2011
Review
2011
Several methods have been proposed to treat combat veterans with posttraumatic stress disorder (PTSD). Still, a recent review… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
2010
2010
This chapter contains sections titled: Silicon for Military Computing, Defining Fairchild's Manufacturing Technology, Recasting… Expand
Review
2008
Review
2008
  • S. Dewar
  • 42nd Annual IEEE International Carnahan…
  • 2008
  • Corpus ID: 9461745
This paper discusses the integration of perimeter intrusion detect systems (PIDS), the various elements of an overall PIDS field… Expand
  • figure 3
2005
2005
  • C. Gray
  • AI & SOCIETY
  • 2005
  • Corpus ID: 189942882
Examining the Strategic Computing Program after four years, in the context of the crucial recognition that it is only a small… Expand
Highly Cited
2003
Highly Cited
2003
  • I. Arce
  • IEEE Secur. Priv.
  • 2003
  • Corpus ID: 15409785
It is a common saying that a chain is only as strong as its weakest link-a phrase information security officers, IT managers… Expand
Highly Cited
1988
Highly Cited
1988
Extensions of program flow monitors and n-version programming can be combined to provide a solution to the detection and… Expand
  • figure 2
  • figure 1
1977
1977
Selecting or even designing a computer architecture is at best as much a black art as a science. The problem is particularly… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
1973
1973
Abstract : This document is a collection of working papers produced by the members of the Computer Security Branch, Directorate… Expand